期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
1
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
下载PDF
A Data Transmission Method Using a Cyclic Redundancy Check and Inaudible Frequencies
2
作者 Myoungbeom Chung 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期32-36,共5页
This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of ... This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%. 展开更多
关键词 Cyclic redundancy check data transmission method high frequency inaudible frequencies
下载PDF
The Design and Implementation of Multi-user Data Sharing Platform for Remote Monitoring System Based on Virtual Instruments
3
作者 Ma GuoSheng Xia XiaoBo 《International Journal of Technology Management》 2014年第8期79-82,共4页
Remote data monitoring system which adopts virtual instrument usually applies data sharing, acquisition and remote transmission technology via internet. It is able to finish concurrent data acquisition and processing ... Remote data monitoring system which adopts virtual instrument usually applies data sharing, acquisition and remote transmission technology via internet. It is able to finish concurrent data acquisition and processing for multi-user and multi-task and also build a personalized virtual testing environment for more people but with fewer instruments. In this paper, we' 11 elaborate on the design and implementation of information sharing platform through a typical example of how to build multi-user concurrent virtual testing environment based on the virtnal software LabVIEW. 展开更多
关键词 Virtual Testing Environment data Sharing Platform Concurrent data Acquisition and Transmission data redundancy
下载PDF
Software Defect Distribution Prediction Model Based on NPE-SVM 被引量:1
4
作者 Hua Wei Chun Shan +2 位作者 Changzhen Hu Huizhong Sun Min Lei 《China Communications》 SCIE CSCD 2018年第5期173-182,共10页
During the prediction of software defect distribution, the data redundancy caused by the multi-dimensional measurement will lead to the decrease of prediction accuracy. In order to solve this problem, this paper propo... During the prediction of software defect distribution, the data redundancy caused by the multi-dimensional measurement will lead to the decrease of prediction accuracy. In order to solve this problem, this paper proposed a novel software defect prediction model based on neighborhood preserving embedded support vector machine(NPESVM) algorithm. The model uses SVM as the basic classifier of software defect distribution prediction model, and the NPE algorithm is combined to keep the local geometric structure of the data unchanged in the process of dimensionality reduction. The problem of precision reduction of SVM caused by data loss after attribute reduction is avoided. Compared with single SVM and LLE-SVM prediction algorithm, the prediction model in this paper improves the F-measure in aspect of software defect distribution prediction by 3%~4%. 展开更多
关键词 data redundancy SVM NPE algorithm dimensionality reduction
下载PDF
Design of a Secure and Efficient Distributed Cryptographic Storage System
5
作者 杨晓元 朱率率 《China Communications》 SCIE CSCD 2011年第2期66-74,共9页
Proxy Re-encryption(PRE) is greatly concerned by researchers recently. It potentially has many useful applications in network communications and file sharing. Secure distributed cryptographic file system is one of its... Proxy Re-encryption(PRE) is greatly concerned by researchers recently. It potentially has many useful applications in network communications and file sharing. Secure distributed cryptographic file system is one of its applications. But the practical applications of PRE are few. And even fewer of them are tested by systematically designed experiments. Appling a couple of representative algorithms proposed by BBS,Ateniese,Shao,et al.,a distributed file system is designed. In the system,some substitute mechanisms such as data dispersal,dynamic file sharing,are well-applied. A lot of features such as flexible authorization and data redundancy are embraced in the system. The comparison evaluation justified that the system is more practical and efficient. 展开更多
关键词 cryptographic file system proxy re-encryption file sharing data redundancy
下载PDF
Video-based Person Re-identification Based on Distributed Cloud Computing
6
作者 Chengyan Zhong Xiaoyu Jiang Guanqiu Qi 《Journal of Artificial Intelligence and Technology》 2021年第2期110-120,共11页
Person re-identification has been a hot research issues in the field of computer vision.In recent years,with the maturity of the theory,a large number of excellent methods have been proposed.However,large-scale data s... Person re-identification has been a hot research issues in the field of computer vision.In recent years,with the maturity of the theory,a large number of excellent methods have been proposed.However,large-scale data sets and huge networks make training a time-consuming process.At the same time,the parameters and their values generated during the training process also take up a lot of computer resources.Therefore,we apply distributed cloud computing method to perform person re-identification task.Using distributed data storage method,pedestrian data sets and parameters are stored in cloud nodes.To speed up operational efficiency and increase fault tolerance,we add data redundancy mechanism to copy and store data blocks to different nodes,and we propose a hash loop optimization algorithm to optimize the data distribution process.Moreover,we assign different layers of the re-identification network to different nodes to complete the training in the way of model parallelism.By comparing and analyzing the accuracy and operation speed of the distributed model on the video-based dataset MARS,the results show that our distributed model has a faster training speed. 展开更多
关键词 person re-identification distributed cloud computing data redundancy mechanism
下载PDF
Research on key technologies of edge cache in virtual data space across WAN
7
作者 Jiantong HUO Yaowen XU +2 位作者 Zhisheng HUO Limin XIAO Zhenxue HE 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第1期15-34,共20页
The authors of this paper have previously proposed the global virtual data space system (GVDS) to aggregate the scattered and autonomous storage resources in China’s national supercomputer grid (National Supercomputi... The authors of this paper have previously proposed the global virtual data space system (GVDS) to aggregate the scattered and autonomous storage resources in China’s national supercomputer grid (National Supercomputing Center in Guangzhou, National Supercomputing Center in Jinan, National Supercomputing Center in Changsha, Shanghai Supercomputing Center, and Computer Network Information Center in Chinese Academy of Sciences) into a storage system that spans the wide area network (WAN), which realizes the unified management of global storage resources in China. At present, the GVDS has been successfully deployed in the China National Grid environment. However, when accessing and sharing remote data in the WAN, the GVDS will cause redundant transmission of data and waste a lot of network bandwidth resources. In this paper, we propose an edge cache system as a supplementary system of the GVDS to improve the performance of upper-level applications accessing and sharing remote data. Specifically, we first designs the architecture of the edge cache system, and then study the key technologies of this architecture: the edge cache index mechanism based on double-layer hashing, the edge cache replacement strategy based on the GDSF algorithm, the request routing based on consistent hashing method, and the cluster member maintenance method based on the SWIM protocol. The experimental results show that the edge cache system has successfully implemented the relevant operation functions (read, write, deletion, modification, etc.) and is compatible with the POSIX interface in terms of function. Further, it can greatly reduce the amount of data transmission and increase the data access bandwidth when the accessed file is located at the edge cache system in terms of performance, i.e., its performance is close to the performance of the network file system in the local area network (LAN). 展开更多
关键词 virtual data space system wide area network edge cache redundant data transmission
原文传递
Consistency Conditions for Cone-Beam CT Data Acquired with a Straight-Line Source Trajectory 被引量:1
8
作者 LEVINE Margo S SIDKY Emil Y 《Tsinghua Science and Technology》 SCIE EI CAS 2010年第1期56-61,共6页
A consistency condition is developed for computed tomography (CT) projection data acquired from a straight-line X-ray source trajectory. The condition states that integrals of normalized projection data along detect... A consistency condition is developed for computed tomography (CT) projection data acquired from a straight-line X-ray source trajectory. The condition states that integrals of normalized projection data along detector lines parallel to the X-ray path must be equal. The projection data is required to be untruncated only along the detector lines parallel to the X-ray path, a less restrictive requirement compared to Fourier conditions that necessitate completely untruncated data. The condition is implemented numerically on simple image functions, a discretization error bound is estimated, and detection of motion inconsistencies is demonstrated. The results show that the consistency condition may be used to quantitatively compare the quality of projection data sets obtained from different scans of the same image object. 展开更多
关键词 data redundancy John's equation consistency conditions
原文传递
RFID unreliable data filtering by integrating adaptive sliding Window and Euclidean distance 被引量:4
9
作者 Li-Lan Liu Zi-Long Yuan +2 位作者 Xue-Wei Liu Cheng Chen Ke-Sheng Wang 《Advances in Manufacturing》 SCIE CAS 2014年第2期121-129,共9页
Through improving the redundant data filtering of unreliable data filter for radio frequency identification(RFID) with sliding-window,a data filter which integrates self-adaptive sliding-window and Euclidean distanc... Through improving the redundant data filtering of unreliable data filter for radio frequency identification(RFID) with sliding-window,a data filter which integrates self-adaptive sliding-window and Euclidean distance is proposed.The input data required being filtered have been shunt by considering a large number of redundant data existing in the unreliable data for RFID and the redundant data in RFID are the main filtering object with utilizing the filter based on Euclidean distance.The comparison between the results from the method proposed in this paper and previous research shows that it can improve the accuracy of the RFID for unreliable data filtering and largely reduce the redundant reading rate. 展开更多
关键词 Radio frequency identification(RFID) Adaptive sliding window Euclidean distance Redundant data
原文传递
Applications of Generalized Rough Set Theory in Evaluation Index System of Radar Anti-Jamming Performance 被引量:9
10
作者 戚宗锋 韩山 李建勋 《Journal of Shanghai Jiaotong university(Science)》 EI 2016年第2期151-158,共8页
Radar anti-jamming performance evaluation is a necessary link in the process of radar development,introduction and equipment. The applications of generalized rough set theory are proposed and discussed in this paper t... Radar anti-jamming performance evaluation is a necessary link in the process of radar development,introduction and equipment. The applications of generalized rough set theory are proposed and discussed in this paper to address the problems of big data, incomplete data and redundant data in the construction of evaluation index system. Firstly, a mass of real-valued data is converted to some interval-valued data to avoid an unacceptable number of equivalence classes and classification rules, and the interval similarity relation is employed to make classifications of this interval-valued data. Meanwhile, incomplete data can be solved by a new definition of the connection degree tolerance relation for both interval-valued data and single-valued data, which makes a better description of rough set than the traditional limited tolerance relation. Then, E-condition entropy-based heuristic algorithm is applied to making attribute reduction to optimize the evaluation index system, and final decision rules can be extracted for system evaluation. Finally, the feasibility and advantage of the proposed methods are testified by a real example of radar anti-jamming performance evaluation. 展开更多
关键词 generalized rough set evaluation index system big data solution incomplete data solution redundant data solution
原文传递
Exact Efficient Handling of Interrupted Illumination in Helical Cone-Beam Computed Tomography with Arbitrary Pitch
11
作者 Harald Schndube Karl Stierstorfer Frédéric Noo 《Tsinghua Science and Technology》 SCIE EI CAS 2010年第1期36-43,共8页
We present a theoretically-exact and stable computed tomography (CT) reconstruction algorithm that is capable of handling interrupted illumination and therefore of using all measured data at arbitrary pitch This alg... We present a theoretically-exact and stable computed tomography (CT) reconstruction algorithm that is capable of handling interrupted illumination and therefore of using all measured data at arbitrary pitch This algorithm is based on a differentiated backprojection (DBP) on M-lines. First, we discuss the problem of interrupted illumination and how it affects the DBP. Then we show that it is possible to take advantage of some properties of the DBP to compensate for the effects of interrupted illumination in a mathematically exact way. From there, we have developed an efficient algorithm which we have successfully implemented. We show encouraging preliminary results using both computer-simulated data and real data. Our results show that our method is capable of achieving a substantial reduction of image noise when decreasing the helix pitch compared with the maximum pitch case. We conclude that the proposed algorithm defines for the first time a theoretically-exact and stable reconstruction method that is capable of beneficially using all measured data at arbitrary pitch. 展开更多
关键词 computed tomography (CT) theoretically-exact and stable image reconstruction differentiated backprojection M-lines redundant data
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部